关注
Keshav Sood
Keshav Sood
Lecturer in Cyber Security, SMIEEE, Deakin University
在 deakin.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Software-defined wireless networking opportunities and challenges for Internet-of-Things: A review
K Sood, S Yu, Y Xiang
IEEE Internet of Things Journal 3 (4), 453-463, 2015
2642015
Cooperative edge caching: A multi-agent deep learning based approach
Y Zhang, B Feng, W Quan, A Tian, K Sood, Y Lin, H Zhang
IEEE Access 8, 133212-133224, 2020
662020
Performance Analysis of Software-Defined Network Switch Using Model
K Sood, S Yu, Y Xiang
IEEE Communications Letters 20 (12), 2522-2525, 2016
662016
Alleviating heterogeneity in SDN-IoT networks to maintain QoS and enhance security
K Sood, KK Karmakar, S Yu, V Varadharajan, SR Pokhrel, Y Xiang
IEEE Internet of Things Journal 7 (7), 5964-5975, 2019
472019
Dynamic access point association using software defined networking
K Sood, S Liu, S Yu, Y Xiang
2015 International Telecommunication Networks and Applications Conference …, 2015
392015
The controller placement problem or the controller selection problem?
K Sood, Y Xiang
Journal of communications and information networks 2, 1-9, 2017
382017
RPPTD: robust privacy-preserving truth discovery scheme
J Chen, Y Liu, Y Xiang, K Sood
IEEE systems journal 16 (3), 4525-4531, 2021
362021
Adaptive service function chaining mappings in 5G using deep Q-learning
G Li, B Feng, H Zhou, Y Zhang, K Sood, S Yu
Computer Communications 152, 305-315, 2020
352020
Efficient federated DRL-based cooperative caching for mobile edge networks
A Tian, B Feng, H Zhou, Y Huang, K Sood, S Yu, H Zhang
IEEE Transactions on Network and Service Management 20 (1), 246-260, 2022
302022
Towards spoofing resistant next generation IoT networks
MR Nosouhi, K Sood, M Grobler, R Doss
IEEE Transactions on Information Forensics and Security 17, 1669-1683, 2022
302022
Enabling machine learning with service function chaining for security enhancement at 5G edges
B Feng, H Zhou, G Li, Y Zhang, K Sood, S Yu
IEEE Network 35 (5), 196-201, 2021
302021
Pasport: A secure and private location proof generation and verification framework
MR Nosouhi, K Sood, S Yu, M Grobler, J Zhang
IEEE Transactions on Computational Social Systems 7 (2), 293-307, 2020
302020
Privacy issues in social networks and analysis: a comprehensive survey
VVH Pham, S Yu, K Sood, L Cui
IET networks 7 (2), 74-84, 2018
292018
Intrusion detection scheme with dimensionality reduction in next generation networks
K Sood, MR Nosouhi, DDN Nguyen, F Jiang, M Chowdhury, R Doss
IEEE Transactions on Information Forensics and Security 18, 965-979, 2023
282023
ERM: An accurate approach to detect DDoS attacks using entropy rate measurement
L Zhou, K Sood, Y Xiang
IEEE Communications Letters 23 (10), 1700-1703, 2019
262019
A general QoS aware flow-balancing and resource management scheme in distributed software-defined networks
K Sood, S Yu, Y Xiang, H Cheng
IEEE access 4, 7176-7185, 2016
242016
A bytecode-based approach for smart contract classification
C Shi, Y Xiang, J Yu, L Gao, K Sood, RRM Doss
2022 IEEE International Conference on Software Analysis, Evolution and …, 2022
232022
Reliability-aware virtual network function placement in carrier networks
L Fang, X Zhang, K Sood, Y Wang, S Yu
Journal of Network and Computer Applications 154, 102536, 2020
232020
An effective and feasible traceback scheme in mobile internet environment
S Yu, K Sood, Y Xiang
IEEE communications letters 18 (11), 1911-1914, 2014
222014
UCoin: An efficient privacy preserving scheme for cryptocurrencies
MR Nosouhi, S Yu, K Sood, M Grobler, R Jurdak, A Dorri, S Shen
IEEE Transactions on Dependable and Secure Computing 20 (1), 242-255, 2021
212021
系统目前无法执行此操作,请稍后再试。
文章 1–20